MIS Exam 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

_________ provide data, voice, and video connectivity to customers

Telecommunication services

All of the following are eras in IT infrastructure evolution except ______

The disruptive technology era

_______ converts domain names to IP addresses

The domain name system (DNS)

Networks of interconnected wireless devices that are embedded in the physical enviroment to provide measurements of many points over large spaces are called _____

Wireless sensor networks

Independent computer programs that copy themselves from one computer to others over a network are called _____

Worms

Hackers flooding a network server with many thousands of false communication requests is called ______

a denial-of-service attack

A model of computing that provides a shared pool of computing resources for an organization to use over the internet is called _____

Cloud computing

The career field that deals with collection and examination fo computer data for legal evidence is called ____

Computer Forensic

A firms ______ could include an awareness of computer forensic

Contingency planning process

the process of detecting and correcting errors in a database is called _____

Data cleansing

A(n) ______ is a structured survey of the accuracy and level of completeness of data in an information system

Data quality audit

A(n) ______ is a database that stores historic and current data for the use of decisions makers in the organization

Data warehouse

The corporate function that is responsible for defining and organization the content of the database as well as database maintenance is _____

Database administration

A(n) _____ enables an organization to centrally manage and organize data

Database management system

A(n) _____ is a discrete binary waveform used for transmission of data

Digital Signal

_______ operates over existing telephone lines to carry data, voice, and video

Digital subscriber line (DSL) technologies

A person, place, or thing which is stored in a database is called a(n)____

Entity

A grouping of characteristic into a word of group of words is called a(n)_____

Field

A combination of hardware and software that prevents unauthorized users from accessing a network is called a _______

Firewall

_____ is a lightweight operating system for cloud computing

Google Chrome OS

The law that requires financial institutions to sneer confidentially of customer data is called the _____

Gramm-Leach-Bililey Act

An open source framework for parallel processing across inexpensive computers is called _____

Hadopp

All of the following are important questions about IT governance EXCEPT ____

How data should be stored in a database

A new version of IP addressing, which contains a 128-bit addresses, is called _____

IPv6

______ consists of processes and tools to identify the valid users of a system

Identity management

______ are used to reliability and securely handle huge transaction volumes, analyze huge data sets, and support large workloads in cloud data centers

Mainframe Computers

A network that spans a city is called a(n)____

Metropolitan area network

______ states that the number of components that a computer chip can hold doubles every two years

Moore's Law

_____ use a more flexible data model and are designed for big data

Non-relational database management systems

Free software produces by a team of hundreds of thousands of programmers around the world is called ____

Open source software

The method of slicing digital messages into pieces, sending the pieces over different communication media and then reassembling the pieces is called _____

Packet Switching

A communication processor used to direct packets of data through different networks is called a(n)____

Router

The network operating system (NOS) _____

Routes network Traffic

A type of malware that takes advantage of poorly coded Web applications is called ____

SQL injection attacks

The ability of a computer, product, or system to expand to serve more users without breaking down is called

Scalability

In relational database, the ____ operation creates a subset of records in the file that meet stated criteria

Select

All of the following are total cost of ownership infrastructure components EXCEPT ____

Staff Salaries

All of the following are part of the transmission control protocol.internet protocol refers model EXCEPT ____

Switching Layer

All of the following are methods of authentication EXCEPT _______

TCP/IP

All of the following are wearable computing devices EXCEPT _____

Tablet Computers

Data which are not visible of the average user are called _____

Ambient data

A risk _______ determines the level of risk to an organization if an activity or process is not properly controlled

Assessment

The range of frequencies that can be accommodated on a telecommunication channel is called ___

Bandwidth

____ is the popular name for a networking standard useful for creating small personal-area networks

Bluetooth

The widespread use of personal devices in the workplace and school is often referred to as ____

Bring your own device (BYOD)`

______ is another way to facility big data analysis and remove bottlenecks normally found in a traditional database

In-memory computing

Data is considered to be _____ when the same attribute has different values

Inconsistent

A(n) ______ specifies the rules of an organization for sharing an disseminating information

Information Policy

A(n) ________ examines the firms overall security includes controls governing individual systems

Information systems audit

All of the following are general controls EXCEPT _____

Input controles

_______ support(s) a firm's website and include(s) web hosting services, router, and cabling or wireless equipment

Internet Platforms

_______ feature (s) monitor the network at its most vulnerable points

Intrusion detection systems

_____ is an object-oriented programming language that is processor and operating system independent

Java

_______ systems are older transaction processing systems, usually created for mainframes

Legacy

The leading operating system on services, mainframe computers, and supercomputers is

Linux

All of the following are physical transmission media EXCEPT ____

Powerlines

The unique identifier for all data in a table is called the _____

Primary Key

Coupling of files used to store information and the application program is called ____

Program-data dependence

A form of encryption that uses two keys is called ______

Public Key encryption

A type of computer that could be in many states at once is called a ____

Quantum Computer

_____ is very useful for inventory and supply chain management

RFID

When thinking about security, controles _____

Refer to policies and procedures that ensure the safety of an organization assets

The decision to purchase or rent IT assets is called the ____

Rent-Versus-Buy Decision

All of the following are essential characteristics of the cloud EXCEPT _____

Web Beacons

A set of loosely coupled software components that exchange information with one another using universal standard languages is called ______

Web Services

All of the following are major internet services EXCEPT ____

Web beacons

All of the following are types of information obtained from data mining EXCEPT ______

Web beacons

A new family of standards developed to deal with the fact that people in remote areas do not have access to Wifi is called ____

WiMax


संबंधित स्टडी सेट्स

Health and life insurance exam pt 5

View Set

California Consumer Protection Act CCPA

View Set

missing unit 6 + incomplete unit 9

View Set

Career Choices Карпюк 9клас

View Set

Self Assessment 5 (ch 7, 8, & 9)

View Set

Health Psychology Exam 2: 6-11, 13

View Set